Password cracking method and device

A technology of passwords and candidate passwords, which is applied in the field of network security, can solve the problems of slow iterative generation of passwords and low accuracy, and achieve the effects of improving the success rate of cracking, increasing the generation rate, and ensuring timeliness

Active Publication Date: 2019-11-19
深圳市格瑞信息科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a password cracking method and a terminal device to solve the problem of slow iterative generation of passwords and low accuracy in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password cracking method and device
  • Password cracking method and device
  • Password cracking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0027] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0028] It should also be und...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of network security, and provides a password cracking method and device, and the method comprises the steps: carrying out the preprocessing of passwords in a training set according to a preset limiting condition, and obtaining a password set in a unified format; performing structure division on the password set to obtain basic structures of all passwords in the password set and a first character string set corresponding to each section in the basic structures; carrying out character string recombination on the first character string set corresponding to each segment to obtain a second character string set; and iteratively generating a candidate password according to the second character string set and the basic structure of the password. The problems of low password iteration generation rate and low accuracy can be solved, the password cracking success rate is improved, and the timeliness of password attack is ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a password cracking method and device. Background technique [0002] With the rapid development of computer network and communication technology, network security has become an important issue in the current information age. Identity authentication is an important line of defense for network security. Passwords have long been the mainstream method of identity authentication due to their simplicity and ease of deployment, and are widely used in e-commerce, online banking, and social media. Password attack is an important means of password security research and one of the important directions of cryptography. Password attack can not only be used in public security forensics and other fields, but also can better test the security of password algorithms and promote the development of password algorithms. [0003] At present, password attack algorithms are mainly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 胡学先刘文芬章梦礼张建辉陈保正李艳捷
Owner 深圳市格瑞信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products